{"id":3497,"date":"2014-04-07T08:45:59","date_gmt":"2014-04-07T13:45:59","guid":{"rendered":"https:\/\/secure.rosehosting.com\/blog\/?p=3497"},"modified":"2022-12-14T10:49:57","modified_gmt":"2022-12-14T16:49:57","slug":"how-to-secure-your-ssh-using-two-step-authentication-on-centos-6","status":"publish","type":"post","link":"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/","title":{"rendered":"How to secure your SSH using two-step authentication on CentOS 6"},"content":{"rendered":"
<\/div>

\"secureThere are several things you can do to secure and protect your SSH. One of them is to use Google Authenticator and create a two-factor authentication on your CentOS VPS<\/a>. Google Authenticator gives you an extra layer of security by generating time based one-time passwords (TOTP) on your smartphone that you must enter along with your username and password in order to login to the server via SSH.<\/p>\n

<\/p>\n

In today’s blog article we will explain how to install Google Authenticator from source and configure SSH for two-factor authentication.<\/p>\n

First of all update your CentOS virtual server<\/p>\n

yum -y update<\/pre>\n

Next, install the ‘pam-devel<\/em>‘ package which allows you to set authentication policies without having to recompile programs that handle authentication.<\/p>\n

yum -y install pam-devel<\/pre>\n

Make sure that ntpd is installed and running because the TOTP security tokens are time sensitive<\/p>\n

yum -y install ntp\r\n\/etc\/init.d\/ntpd start\r\nchkconfig ntpd on<\/pre>\n

Download and unpack the Google authenticator package<\/p>\n

cd \/opt\/\r\nwget https:\/\/google-authenticator.googlecode.com\/files\/libpam-google-authenticator-1.0-source.tar.bz2\r\ntar -xvzf libpam-google-authenticator-1.0-source.tar.bz2\r\ncd libpam-google-authenticator-1.0<\/pre>\n

Compile and install the Google authenticator module<\/p>\n

make\r\nmake install<\/pre>\n

Now, run the Google authenticator on your server and answer each of the questions<\/p>\n

google-authenticator\r\n\r\nDo you want authentication tokens to be time-based (y\/n) y\r\nhttps:\/\/www.google.com\/chart?chs=200x200&chld=M|0&cht=qr&chl=otpauth:\/\/totp\/root@YOURHOSTNAME%3Fsecret%3DWYD4YCGEE5N4M3LA\r\nYour new secret key is: WYD4YCGEE5N4M3LA\r\nYour verification code is 188127\r\nYour emergency scratch codes are:\r\n  60086389\r\n  28918071\r\n  88502143\r\n  60873576\r\n  90892542\r\n\r\nDo you want me to update your \"\/root\/.google_authenticator\" file (y\/n) y\r\n\r\nDo you want to disallow multiple uses of the same authentication\r\ntoken? This restricts you to one login about every 30s, but it increases\r\nyour chances to notice or even prevent man-in-the-middle attacks (y\/n) y\r\n\r\nBy default, tokens are good for 30 seconds and in order to compensate for\r\npossible time-skew between the client and the server, we allow an extra\r\ntoken before and after the current time. If you experience problems with poor\r\ntime synchronization, you can increase the window from its default\r\nsize of 1:30min to about 4min. Do you want to do so (y\/n) y\r\n\r\nIf the computer that you are logging into isn't hardened against brute-force\r\nlogin attempts, you can enable rate-limiting for the authentication module.\r\nBy default, this limits attackers to no more than 3 login attempts every 30s.\r\nDo you want to enable rate-limiting (y\/n) y<\/pre>\n

Open the URL given after answering the first question and scan the QR code using the Google Authenticator application on your smartphone. That’s all. A new verification code will be generated every 30 seconds.<\/p>\n

Now you will need to enable Google authenticator for SSH logins. Open PAM’s configuration file<\/p>\n

vi \/etc\/pam.d\/sshd<\/pre>\n

And add the following line at the top<\/p>\n

auth       required     pam_google_authenticator.so<\/pre>\n

Open the SSH configuration file and ensure that the ‘ChallengeResponseAuthentication<\/em>‘ line is set to yes<\/p>\n

ChallengeResponseAuthentication yes<\/pre>\n

Save the changes and restart the SSH service:<\/p>\n

service sshd restart<\/pre>\n

Now, every time you try to SSH into your server you will be prompted to enter the verification code displayed in your Google Authenticator application.<\/p>\n

login as: \r\nVerification code:\r\nPassword:<\/pre>\n

Of course, if you are one of our Linux VPS Hosting<\/a> customers, you don\u2019t have to do any of this, simply ask our admins, sit back and relax. Our admins will set this up for you immediately. For updates, you can refer to Secure SSH using two-factor authentication on Ubuntu 16.04<\/a>.<\/p>\n

PS.<\/span><\/strong> If you liked this post please share it with your friends on the social networks using the buttons on the left or simply leave a reply below. Thanks.<\/p>\n","protected":false},"excerpt":{"rendered":"

There are several things you can do to secure and protect your SSH. One of them is to use Google … <\/p>\n

Read More<\/a><\/p>\n","protected":false},"author":4,"featured_media":3498,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1699,1703,13],"tags":[34,431,177,359,68,432],"yoast_head":"\nHow to secure your SSH using two-step authentication on CentOS 6 - RoseHosting<\/title>\n<meta name=\"description\" content=\"How to secure your SSH using two-step authentication on CentOS 6 - RoseHosting\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to secure your SSH using two-step authentication on CentOS 6 - RoseHosting\" \/>\n<meta property=\"og:description\" content=\"How to secure your SSH using two-step authentication on CentOS 6 - RoseHosting\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/\" \/>\n<meta property=\"og:site_name\" content=\"RoseHosting\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RoseHosting\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/rosehosting.helpdesk\" \/>\n<meta property=\"article:published_time\" content=\"2014-04-07T13:45:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-14T16:49:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2014\/04\/unnamed.png\" \/>\n\t<meta property=\"og:image:width\" content=\"353\" \/>\n\t<meta property=\"og:image:height\" content=\"381\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@rosehosting\" \/>\n<meta name=\"twitter:site\" content=\"@rosehosting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/\"},\"author\":{\"name\":\"Jeff Wilson\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#\/schema\/person\/7ce77a842fa6a9a7f8efa186f2353713\"},\"headline\":\"How to secure your SSH using two-step authentication on CentOS 6\",\"datePublished\":\"2014-04-07T13:45:59+00:00\",\"dateModified\":\"2022-12-14T16:49:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/\"},\"wordCount\":357,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2014\/04\/unnamed.png\",\"keywords\":[\"centos\",\"google authenticator\",\"linux vps\",\"secure\",\"ssh\",\"two-steps authentication\"],\"articleSection\":[\"CentOS\",\"Security\",\"Tutorials\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/\",\"url\":\"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/\",\"name\":\"How to secure your SSH using two-step authentication on CentOS 6 - RoseHosting\",\"isPartOf\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2014\/04\/unnamed.png\",\"datePublished\":\"2014-04-07T13:45:59+00:00\",\"dateModified\":\"2022-12-14T16:49:57+00:00\",\"description\":\"How to secure your SSH using two-step authentication on CentOS 6 - RoseHosting\",\"breadcrumb\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/#primaryimage\",\"url\":\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2014\/04\/unnamed.png\",\"contentUrl\":\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2014\/04\/unnamed.png\",\"width\":353,\"height\":381},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.rosehosting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to secure your SSH using two-step authentication on CentOS 6\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#website\",\"url\":\"https:\/\/www.rosehosting.com\/blog\/\",\"name\":\"RoseHosting\",\"description\":\"Premium Linux Tutorials Since 2001\",\"publisher\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.rosehosting.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#organization\",\"name\":\"RoseHosting\",\"url\":\"https:\/\/www.rosehosting.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2022\/03\/android-chrome-192x192-1.png\",\"contentUrl\":\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2022\/03\/android-chrome-192x192-1.png\",\"width\":192,\"height\":192,\"caption\":\"RoseHosting\"},\"image\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/RoseHosting\",\"https:\/\/x.com\/rosehosting\",\"https:\/\/www.linkedin.com\/in\/rosehosting\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#\/schema\/person\/7ce77a842fa6a9a7f8efa186f2353713\",\"name\":\"Jeff Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09271207587f897ab46faaed9b355252?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09271207587f897ab46faaed9b355252?s=96&r=g\",\"caption\":\"Jeff Wilson\"},\"description\":\"An experienced Linux veteran with many years of experience. Helping other Linux admins with frequent Linux and business-related blog posts on the RoseHosting blog. Techie by choice. Loving nature and travel. Happily married and father of two lovely children.\",\"sameAs\":[\"https:\/\/www.rosehosting.com\",\"https:\/\/www.facebook.com\/rosehosting.helpdesk\"],\"url\":\"https:\/\/www.rosehosting.com\/blog\/author\/jwilson\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to secure your SSH using two-step authentication on CentOS 6 - RoseHosting","description":"How to secure your SSH using two-step authentication on CentOS 6 - RoseHosting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/","og_locale":"en_US","og_type":"article","og_title":"How to secure your SSH using two-step authentication on CentOS 6 - RoseHosting","og_description":"How to secure your SSH using two-step authentication on CentOS 6 - RoseHosting","og_url":"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/","og_site_name":"RoseHosting","article_publisher":"https:\/\/www.facebook.com\/RoseHosting","article_author":"https:\/\/www.facebook.com\/rosehosting.helpdesk","article_published_time":"2014-04-07T13:45:59+00:00","article_modified_time":"2022-12-14T16:49:57+00:00","og_image":[{"width":353,"height":381,"url":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2014\/04\/unnamed.png","type":"image\/png"}],"author":"Jeff Wilson","twitter_card":"summary_large_image","twitter_creator":"@rosehosting","twitter_site":"@rosehosting","twitter_misc":{"Written by":"Jeff Wilson","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/#article","isPartOf":{"@id":"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/"},"author":{"name":"Jeff Wilson","@id":"https:\/\/www.rosehosting.com\/blog\/#\/schema\/person\/7ce77a842fa6a9a7f8efa186f2353713"},"headline":"How to secure your SSH using two-step authentication on CentOS 6","datePublished":"2014-04-07T13:45:59+00:00","dateModified":"2022-12-14T16:49:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/"},"wordCount":357,"commentCount":3,"publisher":{"@id":"https:\/\/www.rosehosting.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2014\/04\/unnamed.png","keywords":["centos","google authenticator","linux vps","secure","ssh","two-steps authentication"],"articleSection":["CentOS","Security","Tutorials"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/","url":"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/","name":"How to secure your SSH using two-step authentication on CentOS 6 - RoseHosting","isPartOf":{"@id":"https:\/\/www.rosehosting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/#primaryimage"},"image":{"@id":"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2014\/04\/unnamed.png","datePublished":"2014-04-07T13:45:59+00:00","dateModified":"2022-12-14T16:49:57+00:00","description":"How to secure your SSH using two-step authentication on CentOS 6 - RoseHosting","breadcrumb":{"@id":"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/#primaryimage","url":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2014\/04\/unnamed.png","contentUrl":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2014\/04\/unnamed.png","width":353,"height":381},{"@type":"BreadcrumbList","@id":"https:\/\/www.rosehosting.com\/blog\/how-to-secure-your-ssh-using-two-step-authentication-on-centos-6\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rosehosting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to secure your SSH using two-step authentication on CentOS 6"}]},{"@type":"WebSite","@id":"https:\/\/www.rosehosting.com\/blog\/#website","url":"https:\/\/www.rosehosting.com\/blog\/","name":"RoseHosting","description":"Premium Linux Tutorials Since 2001","publisher":{"@id":"https:\/\/www.rosehosting.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rosehosting.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.rosehosting.com\/blog\/#organization","name":"RoseHosting","url":"https:\/\/www.rosehosting.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rosehosting.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2022\/03\/android-chrome-192x192-1.png","contentUrl":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2022\/03\/android-chrome-192x192-1.png","width":192,"height":192,"caption":"RoseHosting"},"image":{"@id":"https:\/\/www.rosehosting.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RoseHosting","https:\/\/x.com\/rosehosting","https:\/\/www.linkedin.com\/in\/rosehosting\/"]},{"@type":"Person","@id":"https:\/\/www.rosehosting.com\/blog\/#\/schema\/person\/7ce77a842fa6a9a7f8efa186f2353713","name":"Jeff Wilson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rosehosting.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09271207587f897ab46faaed9b355252?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09271207587f897ab46faaed9b355252?s=96&r=g","caption":"Jeff Wilson"},"description":"An experienced Linux veteran with many years of experience. Helping other Linux admins with frequent Linux and business-related blog posts on the RoseHosting blog. Techie by choice. Loving nature and travel. Happily married and father of two lovely children.","sameAs":["https:\/\/www.rosehosting.com","https:\/\/www.facebook.com\/rosehosting.helpdesk"],"url":"https:\/\/www.rosehosting.com\/blog\/author\/jwilson\/"}]}},"_links":{"self":[{"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/posts\/3497"}],"collection":[{"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/comments?post=3497"}],"version-history":[{"count":3,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/posts\/3497\/revisions"}],"predecessor-version":[{"id":44275,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/posts\/3497\/revisions\/44275"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/media\/3498"}],"wp:attachment":[{"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/media?parent=3497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/categories?post=3497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/tags?post=3497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}